Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 14:49

General

  • Target

    4243b819a4cacf20d035b5ea54043c3ca3e74f1ad4c5b00a36e7ff2972ffcacb.exe

  • Size

    1.3MB

  • MD5

    38c0044f99107f194b63f9fe29f45f58

  • SHA1

    252b6a6edfc1b97ceb999d563201ece039a11164

  • SHA256

    4243b819a4cacf20d035b5ea54043c3ca3e74f1ad4c5b00a36e7ff2972ffcacb

  • SHA512

    e0724ee785f86706e6c041d8709d9de34a4536844942f558973cb24f231be2f0118b6ad3a67381b5545a266aabc0d8236237846295609406194f5924b4e32974

  • SSDEEP

    24576:px6d5CI3xqGvBSVbGM76eTSAdKIvY8Ss5VtX6rjs:G5CIBqkkN6eTSAQIQJKV4js

Malware Config

Extracted

Family

redline

Botnet

nash

C2

77.91.124.82:19071

Attributes
  • auth_value

    35b6b5194b4fd1ef78124b2387f0c668

Extracted

Family

redline

Botnet

monik

C2

77.91.124.82:19071

Attributes
  • auth_value

    da7d9ea0878f5901f1f8319d34bdccea

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4243b819a4cacf20d035b5ea54043c3ca3e74f1ad4c5b00a36e7ff2972ffcacb.exe
    "C:\Users\Admin\AppData\Local\Temp\4243b819a4cacf20d035b5ea54043c3ca3e74f1ad4c5b00a36e7ff2972ffcacb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4164
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7101419.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7101419.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1788
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8413719.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8413719.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1740
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1442850.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1442850.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1920
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1223665.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1223665.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:216
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4800
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3262544.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3262544.exe
              6⤵
              • Executes dropped EXE
              PID:2984
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 928
                7⤵
                • Program crash
                PID:236
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2748625.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2748625.exe
            5⤵
            • Executes dropped EXE
            PID:2380
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2227000.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2227000.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:4456
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3264434.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3264434.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:484
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:1924
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2984 -ip 2984
        1⤵
          PID:880

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Create or Modify System Process

        1
        T1543

        Windows Service

        1
        T1543.003

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Create or Modify System Process

        1
        T1543

        Windows Service

        1
        T1543.003

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        2
        T1112

        Impair Defenses

        1
        T1562

        Disable or Modify Tools

        1
        T1562.001

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3264434.exe
          Filesize

          393KB

          MD5

          5b1f38496c0d9caaa74be03cfa5ca5e2

          SHA1

          e35647c714d3a847fca50277bbc1dec95ca8b961

          SHA256

          f9043b151a72e633ff11832602b405a6f63643eaa5e48ec69140851b4b61c3fb

          SHA512

          0da136a9005795ffd0b8ec226e78833b751fba74c41ce3ec5beae0f8aeab4a90c76c7da0b58ce3ac3f486092544f01bc767fd139fad03e10fe3f7ba6eb26719d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3264434.exe
          Filesize

          393KB

          MD5

          5b1f38496c0d9caaa74be03cfa5ca5e2

          SHA1

          e35647c714d3a847fca50277bbc1dec95ca8b961

          SHA256

          f9043b151a72e633ff11832602b405a6f63643eaa5e48ec69140851b4b61c3fb

          SHA512

          0da136a9005795ffd0b8ec226e78833b751fba74c41ce3ec5beae0f8aeab4a90c76c7da0b58ce3ac3f486092544f01bc767fd139fad03e10fe3f7ba6eb26719d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7101419.exe
          Filesize

          776KB

          MD5

          9412c3a1ecdfef27330b63af40e69aca

          SHA1

          5d3488821b72e8128e418db3a4fad2a2c6ffcbb6

          SHA256

          6bb7c3e1ef81a57e4228d3c2dc26bdca5760294c77b7aeb49b0887a2af2a0510

          SHA512

          165fbde49877580e9b1b080508fcb61ced06d993f998b877358ad09e0cca8f426cf6a2f0d412b9e9b9c6873e09f099bb60dd318024cf31b15fab623e6a22e9cf

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7101419.exe
          Filesize

          776KB

          MD5

          9412c3a1ecdfef27330b63af40e69aca

          SHA1

          5d3488821b72e8128e418db3a4fad2a2c6ffcbb6

          SHA256

          6bb7c3e1ef81a57e4228d3c2dc26bdca5760294c77b7aeb49b0887a2af2a0510

          SHA512

          165fbde49877580e9b1b080508fcb61ced06d993f998b877358ad09e0cca8f426cf6a2f0d412b9e9b9c6873e09f099bb60dd318024cf31b15fab623e6a22e9cf

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2227000.exe
          Filesize

          399KB

          MD5

          c98377ad81fd1968f314cea4cdd8f1a9

          SHA1

          2c77d82abfaf2ae85b82dd31efa4f403e706a2d2

          SHA256

          a194434158485b7611f4300ccac11b07464db89cc5bf09cc26601d872d393a07

          SHA512

          dd77775d71f83324fcce6a1cbaa3301251ee0e580c70c31c42cd921716a85303a37c4a22f31f4e4b029edeaa69d7fc27763b1d2a6008aff27688ee440e76ba0b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2227000.exe
          Filesize

          399KB

          MD5

          c98377ad81fd1968f314cea4cdd8f1a9

          SHA1

          2c77d82abfaf2ae85b82dd31efa4f403e706a2d2

          SHA256

          a194434158485b7611f4300ccac11b07464db89cc5bf09cc26601d872d393a07

          SHA512

          dd77775d71f83324fcce6a1cbaa3301251ee0e580c70c31c42cd921716a85303a37c4a22f31f4e4b029edeaa69d7fc27763b1d2a6008aff27688ee440e76ba0b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8413719.exe
          Filesize

          506KB

          MD5

          226dc41115838be6d98ecca6bc6ed7e6

          SHA1

          c7794d15e9ccea846ce7ff12dabceac36e2e1106

          SHA256

          514f889e17eb1fddb34ef4f57a15ac4725e9d4636b75a3548c21e2920031a15f

          SHA512

          613cb861d0fee178e717330bbd9df12071074e988b804f3b6e2ce8f6c577c0e5985c16ad11c37db9b4a451c53276d3792a55a614205d2dddfc681d0b0e17040c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8413719.exe
          Filesize

          506KB

          MD5

          226dc41115838be6d98ecca6bc6ed7e6

          SHA1

          c7794d15e9ccea846ce7ff12dabceac36e2e1106

          SHA256

          514f889e17eb1fddb34ef4f57a15ac4725e9d4636b75a3548c21e2920031a15f

          SHA512

          613cb861d0fee178e717330bbd9df12071074e988b804f3b6e2ce8f6c577c0e5985c16ad11c37db9b4a451c53276d3792a55a614205d2dddfc681d0b0e17040c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2748625.exe
          Filesize

          168KB

          MD5

          4d5049062d20b7ff9e78c3dadec7ccb8

          SHA1

          fcfc7aeab4ab58d4db2df38f113b5984526bcd8f

          SHA256

          21a8db193093caf6acbcd14ba64c98a1c9f16998cade8f60fa0fb4dc63e33bd2

          SHA512

          df93b50c075eb5fd8ae1e1db0426bb5144fda44044cac1f5541387b415caa583ed481d818fcc929577ac4d6105ff3cf3e466859fbad1d888a97d3f33f6339dc1

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2748625.exe
          Filesize

          168KB

          MD5

          4d5049062d20b7ff9e78c3dadec7ccb8

          SHA1

          fcfc7aeab4ab58d4db2df38f113b5984526bcd8f

          SHA256

          21a8db193093caf6acbcd14ba64c98a1c9f16998cade8f60fa0fb4dc63e33bd2

          SHA512

          df93b50c075eb5fd8ae1e1db0426bb5144fda44044cac1f5541387b415caa583ed481d818fcc929577ac4d6105ff3cf3e466859fbad1d888a97d3f33f6339dc1

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1442850.exe
          Filesize

          320KB

          MD5

          42eff475d26211e1c98b9e2ba75fcfc7

          SHA1

          2df6a35b333563b34327e1bba7a45d1d525cef30

          SHA256

          cbd35bb66458d53bab6b7c0c5787938f1c4e0c093b4d51be0fb34ab5f8b814f6

          SHA512

          b40d35a68df0e4f2137bed6f16943b46e75ad6af21dad48fba59940bab4dc47153463975f9dbc863a934d331b3aa62cd798e2a716db81361d59407527a989932

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1442850.exe
          Filesize

          320KB

          MD5

          42eff475d26211e1c98b9e2ba75fcfc7

          SHA1

          2df6a35b333563b34327e1bba7a45d1d525cef30

          SHA256

          cbd35bb66458d53bab6b7c0c5787938f1c4e0c093b4d51be0fb34ab5f8b814f6

          SHA512

          b40d35a68df0e4f2137bed6f16943b46e75ad6af21dad48fba59940bab4dc47153463975f9dbc863a934d331b3aa62cd798e2a716db81361d59407527a989932

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1223665.exe
          Filesize

          236KB

          MD5

          07cc5cdde3f150f19f5431eff5b9cc3a

          SHA1

          70a059fac76cdb915a97e027d2ba4dc7b698dc7c

          SHA256

          9820df5483863f0748fabfadc44cc1da25bd16a0e299f277faa10a1e1f11f0db

          SHA512

          b2670b8b503892f849c69f61d1949750453579fb6d665e41328556bed5e0bdd3bc5f8f570864f84723ade92fd63c615df5d31ef180721a6f5f9151d580bfe1f7

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1223665.exe
          Filesize

          236KB

          MD5

          07cc5cdde3f150f19f5431eff5b9cc3a

          SHA1

          70a059fac76cdb915a97e027d2ba4dc7b698dc7c

          SHA256

          9820df5483863f0748fabfadc44cc1da25bd16a0e299f277faa10a1e1f11f0db

          SHA512

          b2670b8b503892f849c69f61d1949750453579fb6d665e41328556bed5e0bdd3bc5f8f570864f84723ade92fd63c615df5d31ef180721a6f5f9151d580bfe1f7

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3262544.exe
          Filesize

          173KB

          MD5

          6071879e8e1728df0141a799620f170a

          SHA1

          3b5df5c8007aef70bd105ed805e77787cf977149

          SHA256

          2cefb530e32d1be974b017745bcc0ab98d1da31c2d3a503af75cf3698448c612

          SHA512

          51d5d2c047b94245067155b9743f9f1ca0b4ced4369d105b6c5f03df414c8382d66d0091a659ad5adfffe4a9d68697b44a2fc95178202755086bfff676b84ae9

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3262544.exe
          Filesize

          173KB

          MD5

          6071879e8e1728df0141a799620f170a

          SHA1

          3b5df5c8007aef70bd105ed805e77787cf977149

          SHA256

          2cefb530e32d1be974b017745bcc0ab98d1da31c2d3a503af75cf3698448c612

          SHA512

          51d5d2c047b94245067155b9743f9f1ca0b4ced4369d105b6c5f03df414c8382d66d0091a659ad5adfffe4a9d68697b44a2fc95178202755086bfff676b84ae9

        • memory/1924-59-0x0000000000400000-0x000000000042F000-memory.dmp
          Filesize

          188KB

        • memory/1924-62-0x0000000000400000-0x000000000042F000-memory.dmp
          Filesize

          188KB

        • memory/1924-61-0x0000000000400000-0x000000000042F000-memory.dmp
          Filesize

          188KB

        • memory/1924-60-0x0000000000400000-0x000000000042F000-memory.dmp
          Filesize

          188KB

        • memory/2984-36-0x0000000000AC0000-0x0000000000AF0000-memory.dmp
          Filesize

          192KB

        • memory/2984-37-0x0000000074470000-0x0000000074C20000-memory.dmp
          Filesize

          7.7MB

        • memory/2984-39-0x0000000074470000-0x0000000074C20000-memory.dmp
          Filesize

          7.7MB

        • memory/4164-0-0x0000000000400000-0x0000000000513000-memory.dmp
          Filesize

          1.1MB

        • memory/4164-48-0x0000000000400000-0x0000000000513000-memory.dmp
          Filesize

          1.1MB

        • memory/4164-2-0x0000000000400000-0x0000000000513000-memory.dmp
          Filesize

          1.1MB

        • memory/4164-63-0x0000000000400000-0x0000000000513000-memory.dmp
          Filesize

          1.1MB

        • memory/4164-3-0x0000000000400000-0x0000000000513000-memory.dmp
          Filesize

          1.1MB

        • memory/4164-1-0x0000000000400000-0x0000000000513000-memory.dmp
          Filesize

          1.1MB

        • memory/4456-58-0x000000000A960000-0x000000000A9AC000-memory.dmp
          Filesize

          304KB

        • memory/4456-51-0x0000000074470000-0x0000000074C20000-memory.dmp
          Filesize

          7.7MB

        • memory/4456-56-0x000000000A790000-0x000000000A7A2000-memory.dmp
          Filesize

          72KB

        • memory/4456-55-0x0000000005290000-0x00000000052A0000-memory.dmp
          Filesize

          64KB

        • memory/4456-57-0x000000000A7F0000-0x000000000A82C000-memory.dmp
          Filesize

          240KB

        • memory/4456-53-0x000000000AD40000-0x000000000B358000-memory.dmp
          Filesize

          6.1MB

        • memory/4456-46-0x0000000000400000-0x0000000000430000-memory.dmp
          Filesize

          192KB

        • memory/4456-54-0x000000000A850000-0x000000000A95A000-memory.dmp
          Filesize

          1.0MB

        • memory/4456-68-0x0000000005290000-0x00000000052A0000-memory.dmp
          Filesize

          64KB

        • memory/4456-50-0x00000000051C0000-0x00000000051C6000-memory.dmp
          Filesize

          24KB

        • memory/4456-67-0x0000000074470000-0x0000000074C20000-memory.dmp
          Filesize

          7.7MB

        • memory/4800-64-0x0000000074470000-0x0000000074C20000-memory.dmp
          Filesize

          7.7MB

        • memory/4800-66-0x0000000074470000-0x0000000074C20000-memory.dmp
          Filesize

          7.7MB

        • memory/4800-38-0x0000000074470000-0x0000000074C20000-memory.dmp
          Filesize

          7.7MB

        • memory/4800-32-0x0000000000400000-0x000000000040A000-memory.dmp
          Filesize

          40KB